
Sign up to save your podcasts
Or


Every Breath You Don't Take: Deepfake Speech Detection Using Breath
Perturbing Attention Gives You More Bang for the Buck: Subtle Imaging
Leverage Variational Graph Representation For Model Poisoning on
Near-Universally-Optimal Differentially Private Minimum Spanning Trees
EarPass: Secure and Implicit Call Receiver Authentication Using Ear
Zero-Knowledge Location Privacy via Accurate Floating Point SNARKs
Saving proof-of-work by hierarchical block structure
Manipulating Recommender Systems: A Survey of Poisoning Attacks and
Super Mario in the Pernicious Kingdoms: Classifying glitches in old
Talk Too Much: Poisoning Large Language Models under Token Limit
A Customer Level Fraudulent Activity Detection Benchmark for Enhancing
Incorporating Gradients to Rules: Towards Lightweight, Adaptive
Source Code Vulnerability Detection: Combining Code Language Models and
Double Privacy Guard: Robust Traceable Adversarial Watermarking against
Pseudorandom Permutations from Random Reversible Circuits
Teaching Network Traffic Matrices in an Interactive Game Environment
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>
By KazuEvery Breath You Don't Take: Deepfake Speech Detection Using Breath
Perturbing Attention Gives You More Bang for the Buck: Subtle Imaging
Leverage Variational Graph Representation For Model Poisoning on
Near-Universally-Optimal Differentially Private Minimum Spanning Trees
EarPass: Secure and Implicit Call Receiver Authentication Using Ear
Zero-Knowledge Location Privacy via Accurate Floating Point SNARKs
Saving proof-of-work by hierarchical block structure
Manipulating Recommender Systems: A Survey of Poisoning Attacks and
Super Mario in the Pernicious Kingdoms: Classifying glitches in old
Talk Too Much: Poisoning Large Language Models under Token Limit
A Customer Level Fraudulent Activity Detection Benchmark for Enhancing
Incorporating Gradients to Rules: Towards Lightweight, Adaptive
Source Code Vulnerability Detection: Combining Code Language Models and
Double Privacy Guard: Robust Traceable Adversarial Watermarking against
Pseudorandom Permutations from Random Reversible Circuits
Teaching Network Traffic Matrices in an Interactive Game Environment
なお、ポッドキャスト内で紹介する内容は、各論文の概要を日本語で解説したもので、論文概要の著作権は論文著者に帰属します。
]]>